http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Coulibaly Adama,Kpeglo David O.,Darko Emmanuel O. 대한방사선방어학회 2023 방사선방어학회지 Vol.48 No.2
Background : Food consumption is one of the most important routes for radionuclide intake for the public ; therefore , there is the need to have a comprehensive understanding of the amount of radioactivity in food products . Consumption of radionuclide-contaminated food could in- crease potential health risks associated with exposure to radiation such as cancers . The present study aims to determine radioactivity levels in some food products (milk , rice , sugar, and wheat flour) consumed in Mali and to evaluate the radiological effect on the public health from these radionuclides . Materials and Methods : The health impact due to ingestion of radionuclides from these foods was evaluated by the determination of activity concentration of radionuclides 238U, 232Th, 40K , and 137 Cs using gamma spectrometry system with high-purity germanium detector and radiological hazards index in 16 samples collected in some markets , mall , and shops of Bamako-Mali . JRPR Results and Discussion : The average activity concentrations were 9 . 8 ± 0 . 6 Bq/kg for 238U, 8.7± 0 . 5 Bq/kg for 232Th , 162 . 9 ± 7 . 9 Bq/kg for 40K , and 0 . 0035 ± 0 . 0005 Bq/kg for 137Cs . The mean values of radiological hazard parameters such as annual committed effective dose , internal haz- ard index , and risk assessment from this work were within the dose criteria limits given by in- ternational organizations (International Commission on Radiological Protection and United Nations Scientific Committee on the Effects of Atomic Radiation) and national standards . Conclusion : The results show low public exposure to radioactivity and associated radiological impact on public health . Nevertheless , this study stipulates vital data for future research and regulatory authorities in Mali .
Quenching for discretization of a semilinear heat equation with singular boundary outflux
Anoh Assiedou Rodrigue,N'Guessan Koffi,Coulibaly Adama,Toure Kidjegbo Augustin 원광대학교 기초자연과학연구소 2021 ANNALS OF FUZZY MATHEMATICS AND INFORMATICS Vol.22 No.2
This paper concerns the study of the discret approximation for the following semilinear heat equation with a singular boundary outflux $$\\ \left\{% \begin{array}{ll} \hbox{$\dfrac{\partial u}{\partial t}=u_{xx} + (1-u)^{-p}, \quad 0<x<1,\; t>0$,} \\ \hbox{$u_{x}(0,t)= 0, \quad u_{x}(1,t)=-u(1,t)^{-q},\quad t>0$,} \\ \hbox{$u(x,0)=u_{0}(x),\quad 0\leq x \leq 1$,} \\ \end{array}% \right.$$ where $ p>0, $ $ q > 0. $ We find some conditions under which the solution of a discrete form of above problem quenches in a finite time and estimate its discrete quenching time. We also establish the convergence of the discrete quenching time to the theoretical one when the mesh size tends to zero. Finally, we give some numerical experiments for a best illustration of our analysis.
Camara Gninlfan Modeste,N’Guessan Koffi,Coulibaly Adama,Toure Kidjegbo Augustin 원광대학교 기초자연과학연구소 2021 ANNALS OF FUZZY MATHEMATICS AND INFORMATICS Vol.22 No.3
This paper concerns the study of the numerical approximation for the following initial-boundary value problem .$$\left\{% \begin{array}{ll} \hbox{$u_t=\left( \vert u_{x}\vert^{p-2}u_{x}\right)_{x} + \left( 1-u\right)^{-h} ,\quad 0<x<1,\; t>0$,} \\ \hbox{$u_{x}(0,t)=0, \quad u_{x}(1,t)= - u^{-q}(1,t),\quad t>0$,} \\ \hbox{$u(x,0)=u_{0}(x) > 0,\quad 0\leq x \leq 1$,} \\ \end{array}% \right. $$ where $p\geq 2$, $h>0$, $q>0$. $u_{0}: [0,1] \rightarrow (0,1)$ and satisfies compatiblity conditions. We find some conditions under which the solution of a discrete form of above problem quenches in a finite time and estimate its discrete quenching time. We also establish the convergence of the discrete quenching time to the theoretical one when the mesh size tends to zero. Finally, we give some numerical experiments for a best illustration of our analysis.
Quenching for discretization of a nonlinear diffusion equation with singular boundary flux
NGuessan Koffi,Anoh Assiedou Rodrigue,Coulibaly Adama,Toure Kidjegbo Augustin 원광대학교 기초자연과학연구소 2022 ANNALS OF FUZZY MATHEMATICS AND INFORMATICS Vol.23 No.1
In this paper, we study the discrete approximation for the following nonlinear diffusion equation with nonlinear source and singular boundary flux $$\\ \left\{% \begin{array}{ll} \hbox{$\dfrac{\partial A(u)}{\partial t}=u_{xx} + (1-u)^{-\alpha}, \quad 0<x<1,\; t>0$,} \\ \hbox{$u_{x}(0,t)= 0, \quad u_{x}(1,t)=-B(u(1,t)),\quad t>0$,} \\ \hbox{$u(x,0)=u_{0}(x),\quad 0\leq x \leq 1$,} \\ \end{array}% \right. $$ with $ \alpha > 0. $ We find some conditions under which the solution of a discrete form of above problem quenches in a finite time and estimate its discrete quenching time. We also establish the convergence of the discrete quenching time to the theoretical one when the mesh size tends to zero. Finally, we give some numerical experiments for a best illustration of our analysis.
Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection
BODJRE, Aka Hugues Felix,ADEPO, Joel,COULIBALY, Adama,BABRI, Michel International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.1
Elastic Optical Networks (EONs) allow to solve the high demand for bandwidth due to the increase in the number of internet users and the explosion of multicast applications. To support multicast applications, network operator computes a tree-shaped path, which is a set of optical channels. Generally, the demand for bandwidth on an optical channel is enormous so that, if there is a single fiber failure, it could cause a serious interruption in data transmission and a huge loss of data. To avoid serious interruption in data transmission, the tree-shaped path of a multicast connection may be protected. Several works have been proposed methods to do this. But these works may cause the duplication of some resources after recovery due to a link failure. Therefore, this duplication can lead to inefficient use of network resources. Our work consists to propose a method of protection that eliminates the link that causes duplication so that, the final backup path structure after link failure is a tree. Evaluations and analyses have shown that our method uses less backup resources than methods for protection of a multicast connection.